TrueMedia.org web application for querying multiple deepfake detection models and analyzing results
☆22Jan 24, 2025Updated last year
Alternatives and similar repositories for deepfake-app
Users that are interested in deepfake-app are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆14Jul 4, 2025Updated 8 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 3 weeks ago
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- See https://github.com/FastCGI-Archives/fcgi2 for a "maintained" mirror☆11May 26, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- Aggregation of lists of malicious hashes of malware that can be integrated into FortiGate firewalls and other products.☆44Updated this week
- Display USGS Watershed maps on a Node-RED Dashboard with Water Quality Reports☆11Jun 9, 2020Updated 5 years ago
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 7 months ago
- ☆19Mar 10, 2026Updated 2 weeks ago
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- A collection of SoftLayer API examples in a variety of languages☆14Updated this week
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Turn a standard Raspbian Lite install into a tor-ified wifi access point☆14Aug 3, 2017Updated 8 years ago
- Virtual Lab Automation☆18Jun 25, 2025Updated 9 months ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- PDF_Tools es una extensión para Google Chrome que integra potentes herramientas para unir y dividir archivos PDF directamente en un moder…☆30Jan 5, 2026Updated 2 months ago
- Pound Load Balancer used in RELIANOID ADC for HTTP and HTTPS userspace management. It includes some features developed by the RELIANOID T…☆16Jan 2, 2025Updated last year
- A cryptographically secure password generator that provides high-entropy passwords with configurable requirements. Uses platform-native c…☆23Oct 25, 2024Updated last year
- This repository contains a general list of how to items for any language similar to gist style articles but focused in a repo☆21Feb 6, 2026Updated last month
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Test résumés and CVs in FRESH (and JSON Resume!) formats.☆10Feb 8, 2018Updated 8 years ago
- Architecture of Twint scrapper which allow download tweets on many instances without api restrictions☆10Nov 30, 2020Updated 5 years ago
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year
- RPGLE runtime for .NET Core☆23Jun 22, 2022Updated 3 years ago
- Python Scripts to Interact with VirusTotal, Malwares.com and Google Safe Browsing.☆11Dec 1, 2016Updated 9 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Mar 20, 2026Updated last week
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Express API documentation generator☆10Jul 19, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- A scriptable interface to ZeroTier One's administration API.☆20Jul 27, 2016Updated 9 years ago
- Hardening Standalone Windows Server installations. LIST OF RULES NOT A PLUGIN☆13Jan 30, 2017Updated 9 years ago
- Mail Header Detective is a powerful tool that can help dissect complex email headers, providing useful insights and valuable information …☆14May 5, 2024Updated last year
- Personal scripts☆15Sep 11, 2024Updated last year
- Tool based on AWS-CLI commands for AWS account hardening, following guidelines of the CIS Amazon Web Services Foundations Benchmark (http…☆13Jan 18, 2017Updated 9 years ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆54Sep 19, 2025Updated 6 months ago